• It's a brand new research arena in information security.

    非技术手段信息安全中的一个崭新研究方向。

    youdao

  • Thus, certification is an important issue in information security field.

    可见认证技术信息安全领域具有举足重轻的地位

    youdao

  • Digital watermarking is a new data hide technology in information security domain.

    数字水印一种全新信息安全技术

    youdao

  • Therefore, chaos-based encryption techniques play an increasing role in information security.

    因此,基于混沌密码技术信息安全方面具有重要的地位

    youdao

  • Degree required: Associate's or bachelor's degree in computing or certifications in information security.

    文凭要求计算机学士学位大专学位,或信息安全认证

    youdao

  • Block cipher is one of the most important encryption and decryption algorithms in information security.

    分组密码算法是信息安全领域最为重要解密技术之一

    youdao

  • The thesis researches on the identity authentication and access control in information security technology.

    本文身份认证访问控制等方面对信息安全的相关技术进行了分析研究

    youdao

  • Therefore, the research on ECC and its applications are becoming new highlight in information security field.

    因此ECC及其应用正在晋升为信息安全研究领域新的热点

    youdao

  • This paper mainly discusses the watermark technique applied in information security concerning digital image.

    论文主要探讨有关数字图像信息安全中的数字水印技术

    youdao

  • In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.

    PK I技术为基础,应用ssl协议研究PK I技术保障网络信息传输安全上的应用

    youdao

  • Those factors are leading to a crisis in information security that will demand new solutions from the security specialists.

    这些因素导致信息安全危机,从而需要来自安全专家新的解决方案

    youdao

  • Play in information security Cryptography plays an important role in information security has become an important part.

    信息安全中起着举足轻重作用密码学也就成为信息安全不可或缺的重要部分

    youdao

  • The network information security defensive system is a important problem in information security domain for recent years.

    网络信息安全防御体系近年来信息安全领域探讨的一个重要问题

    youdao

  • After current problems being solved, encrypted file system will have broad application prospect in information security field.

    加密文件系统如能克服现有一些缺点,将来信息安全领域广阔的应用前景

    youdao

  • This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.

    研究结果有助于序列密码算法信息安全现代保密通信设备中的应用

    youdao

  • Personal identity authentication is a key part in information security architecture and also the premise of the integral information security.

    个人身份认证信息安全体系一个非常关键环节。

    youdao

  • Grading protection is an important tenet in information security technology. This tenet is also applicable to the network disaster-tolerant system.

    等级保护信息安全技术重要原则之一,作为信息安全重要组成部分网络容灾系统同样遵循一原则。

    youdao

  • Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.

    恶意删除数据现象时常发生,数据恢复成败关系信息安全

    youdao

  • Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.

    量子密钥分配技术信息安全最热门研究课题起源于量子力学中的测不准原理未知量子态的不可克隆定理。

    youdao

  • BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.

    BCH纠错编码线性分组一种较好的纠错能力信息隐藏近年来信息安全领域出现的技术

    youdao

  • The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.

    入侵检测技术作为确保计算机网络信息安全一个重要手段成为信息安全领域研究热点之一

    youdao

  • This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.

    该法应用其他连续混沌系统中,有助于加快混沌系统信息安全保密通信网络领域中的应用。

    youdao

  • If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.

    如果现在正在(曾经)信息产业工作,你可以参加在线信息安全培训,获得在线学位证明

    youdao

  • Random number is always chosen by the participant in information security protocol, which can not be verified by other participants, so that the fairness of protocol is affected.

    信息安全协议使用随机数通常协议参与者任意选取其他参与方无法验证从而影响协议公平性

    youdao

  • Therefore, the access control becomes one of the essential functions in information security and is to protect the storage and handling of information in enterprise information system.

    因此访问控制成为信息安全必不可少功能之一,其目的为了保护企业信息系统存储处理的信息的安全。

    youdao

  • The ASIP, which features the high efficiency of ASIC co-processor and the flexibility of General Purpose Processor, has and will have popular application in information security domain.

    专用指令集处理器ASIP)结合ASIC处理器高效性通用处理器灵活性信息安全领域具有广泛的应用前景

    youdao

  • The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.

    阐述信息安全风险评估所要解决的问题介绍了目前信息安全风险评估领域主要方法这些方法进行了分析和评价

    youdao

  • The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.

    阐述信息安全风险评估所要解决的问题介绍了目前信息安全风险评估领域主要方法这些方法进行了分析和评价

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定